15-Network Management and Monitoring Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C MSR610[810][830][1000S][2600][3600] Routers Configuration Guides(V7)-R6749-6W10015-Network Management and Monitoring Configuration Guide
20-Flow log configuration
Title Size Download
20-Flow log configuration 340.51 KB

Configuring flow log

About flow log

Flow log records session information based on flows.

A flow log entry might contain the following information about a flow:

·     Network access quintuple information (source IP address, destination IP address, source port, destination port, and protocol number).

·     Statistics about sent and received packets.

·     Flow-based link selection information.

Flow log export

You can export flow log entries in the following methods:

·     Export flow log entries to log hosts. Flow log entries are sent as binary characters in UDP. One UDP packet can contain multiple log entries.

·     Export flow log entries to the information center. Flow log entries are converted to syslog entries in ASCII format, with the informational severity level. The information center specifies the output destinations for the log entries. For more information about the information center, see "Configuring the information center."

Log entries in ASCII format are human readable. However, the log data volume is higher in ASCII format than in binary format. As a best practice, export flow log entries in binary format to log hosts if the log data volume is large.

Restrictions: Hardware compatibility with flow log

Hardware

Flow log compatibility

MSR610

Yes

MSR810, MSR810-W, MSR810-W-DB, MSR810-LM, MSR810-W-LM, MSR810-10-PoE, MSR810-LM-HK, MSR810-W-LM-HK, MSR810-LM-CNDE-SJK , MSR810-CNDE-SJK, MSR810-EI, MSR810-LM-EA, MSR810-LM-EI

Yes

MSR810-LMS, MSR810-LUS

No

MSR810-SI, MSR810-LM-SI

No

MSR810-LMS-EA, MSR810-LME

Yes

MSR1004S-5G, MSR1004S-5G-CN

Yes

MSR1104S-W, MSR1104S-W-CAT6, MSR1104S-5G-CN, MSR1104S-W-5G-CN

Yes

MSR2600-6-X1, MSR2600-15-X1, MSR2600-15-X1-T

Yes

MSR2600-10-X1

Yes

MSR 2630

Yes

MSR3600-28, MSR3600-51

Yes

MSR3600-28-SI, MSR3600-51-SI

No

MSR3600-28-X1, MSR3600-28-X1-DP, MSR3600-51-X1, MSR3600-51-X1-DP

Yes

MSR3600-28-G-DP, MSR3600-51-G-DP

Yes

MSR3610-I-DP, MSR3610-IE-DP, MSR3610-IE-ES, MSR3610-IE-EAD, MSR-EAD-AK770, MSR3610-I-IG, MSR3610-IE-IG

Yes

MSR3610-X1, MSR3610-X1-DP, MSR3610-X1-DC, MSR3610-X1-DP-DC, MSR3620-X1, MSR3640-X1

Yes

MSR 3610, MSR 3620, MSR 3620-DP, MSR 3640, MSR 3660

Yes

MSR3610-G, MSR3620-G

Yes

MSR3640-G

Yes

MSR3640-X1-HI

Yes

 

Hardware

Flow log compatibility

MSR810-W-WiNet, MSR810-LM-WiNet

Yes

MSR830-4LM-WiNet

Yes

MSR830-5BEI-WiNet, MSR830-6EI-WiNet, MSR830-10BEI-WiNet

Yes

MSR830-6BHI-WiNet, MSR830-10BHI-WiNet

Yes

MSR2600-6-WiNet

Yes

MSR2600-10-X1-WiNet

Yes

MSR2630-WiNet

Yes

MSR3600-28-WiNet

Yes

MSR3610-X1-WiNet

Yes

MSR3610-WiNet, MSR3620-10-WiNet, MSR3620-DP-WiNet, MSR3620-WiNet, MSR3660-WiNet

Yes

 

Hardware

Flow log compatibility

MSR860-6EI-XS

Yes

MSR860-6HI-XS

Yes

MSR2630-XS

Yes

MSR3600-28-XS

Yes

MSR3610-XS

Yes

MSR3620-XS

Yes

MSR3610-I-XS

Yes

MSR3610-IE-XS

Yes

MSR3620-X1-XS

Yes

MSR3640-XS

Yes

MSR3660-XS

Yes

 

Hardware

Flow log compatibility

MSR810-LM-GL

Yes

MSR810-W-LM-GL

Yes

MSR830-6EI-GL

Yes

MSR830-10EI-GL

Yes

MSR830-6HI-GL

Yes

MSR830-10HI-GL

Yes

MSR1004S-5G-GL

Yes

MSR2600-6-X1-GL

Yes

MSR3600-28-SI-GL

No

 

 

Flow log packet

The flow log data (including the log header and log body) is carried in the body of a UDP packet. The log header contains the common fields and the log body contains the service-specific log information. The log body of a flow log packet can contain one or multiple log entries of the same type.

Figure 1 Flow log packet

Flow log supports multiple service modules. The log body fields vary with the log type or log version. For more information about flow log fields, see "Appendix A Flow log fields."

NAT flow log tasks at a glance

To configure NAT flow log, perform the following tasks:

1.     Specifying a flow log export destination

Choose one of the following tasks:

¡     Specifying a log host as the flow log export destination

¡     Specifying the information center as the flow log export destination

2.     (Optional.) Configuring the flow log version

3.     (Optional.) Specifying a source IP address for flow log packets

4.     (Optional.) Configuring the timestamp of flow log entries

5.     (Optional.) Enabling load balancing for flow log entries

6.     (Optional.) Configuring flow log host groups

Configuring flow log

Before you configure the flow log feature, complete the following tasks:

·     Enable NAT logging by using the nat log enable command. For more information, see NAT commands in Layer 3—IP Services Command Reference.

·     Enable AFT logging by using the aft log enable command. For more information, see AFT commands in Layer 3—IP Services Command Reference.

·     Enable RIR logging by using the log enable command in RIR view.

Specifying a flow log export destination

Restrictions and guidelines for flow log export destination configuration

You can export flow log entries to a log host or to the information center, but not both. If you configure both methods, the system exports flow log entries to the information center.

Flow log entries exported to the information center has the informational severity level.

Specifying a log host as the flow log export destination

1.     Enter system view.

system-view

2.     Specify a log host as the destination for flow log export.

userlog flow export [ vpn-instance vpn-instance-name ] host { hostname | ipv4-address | ipv6 ipv6-address } port udp-port

By default, no log hosts are specified.

You can specify multiple log hosts.

Specifying the information center as the flow log export destination

1.     Enter system view.

system-view

2.     Specify the information center as the destination for flow log export.

userlog flow syslog

By default, flow log entries are not exported to the information center.

 

CAUTION

CAUTION:

The device might generate a lot of session logs in a short time. If the session logs are exported to the information center for processing, the information center might occupy too much device performance, affecting normal operations of the device.

Configuring the flow log version

Restrictions and guidelines

Make sure the specified flow log version is supported on the log host.

If you configure the flow log version multiple times, the most recent configuration takes effect.

Procedure

1.     Enter system view.

system-view

2.     Configure the flow log version.

userlog flow export version version-number

The default flow log version is 1.0.

Specifying a source IP address for flow log packets

About this task

By default, the source IP address for flow log packets is the IP address of their outgoing interface. For the log hosts to filter log entries by log sender, specify a source IP address for all flow log packets.

Restrictions and guidelines

As a best practice, use a Loopback interface's address as the source IP address for flow log packets. A Loopback interface is always up. The setting avoids export failure on interfaces that might go down.

Procedure

1.     Enter system view.

system-view

2.     Specify a source IP address for flow log packets.

userlog flow export source-ip { ipv4-address | ipv6 ipv6-address }

By default, the source IP address for flow log packets is the IP address of their outgoing interface.

Configuring the timestamp of flow log entries

About this task

The device uses either the local time or the UTC time in the timestamp of flow logs.

·     UTC time—Standard Greenwich Mean Time (GMT).

·     Local time—Standard GMT plus or minus the time zone offset.

The time zone offset can be configured by using the clock timezone command. For more information, see device management in Fundamentals Command Reference.

Procedure

1.     Enter system view.

system-view

2.     Configure the device to use the local time in the flow log timestamp.

userlog flow export timestamp localtime

By default, the UTC time is used in the flow log timestamp.

Enabling load balancing for flow log entries

About this task

By default, the device sends a copy of each flow log entry to all configured log hosts. When one log host fails, other log hosts still have complete flow log entries.

In load balancing mode, flow log entries are distributed among log hosts based on the source IP addresses (before NAT) that are recorded in the entries. The flow log entries generated for the same source IP address are sent to the same log host.

Restrictions and guidelines

In load balancing mode, flow log entries are load balanced among all configured log hosts, regardless of whether the log hosts are reachable. If a log host is unreachable, the flow log entries sent to it will be lost.

Procedure

1.     Enter system view.

system-view

2.     Enable load balancing for flow log entries.

userlog flow export load-balancing

By default, load balancing is disabled.

Configuring flow log host groups

About flow log host group

By default, the device sends a copy of each flow log entry to all available log hosts. To filter logs and reduce the log sending and processing workload of the device, configure the flow log host group feature.

The flow log host group feature allows you to classify flow log hosts into groups and specify an ACL for each group. A flow log matches a log host group if it matches the group's ACL, and it is sent only to the log hosts in the matching group.

If a flow log matches multiple log host groups, the device sends the log to the group that comes first in alphabetical order of the matching group names.

If a flow log does not match any log host groups, the device ignores the log host group configuration and sends the log to all configured log hosts.

If load balancing is enabled, flow logs sent to a log host group will be load-shared among the log hosts in the group. Flow logs generated for the same source IP address are sent to the same log host.

Prerequisites for log host group configuration

Before you configure flow log host groups, complete the following tasks:

·     Configure the ACLs to be used by the flow log host groups.

·     Use the userlog flow export host command to configure the log hosts to be assigned to the flow log host groups.

Configuring an IPv4 flow log host group

1.     Enter system view.

system-view

2.     Create an IPv4 flow log host group and enter its view.

userlog host-group host-group-name acl { name acl-name | number acl-number }

By default, no IPv4 flow log host groups exist.

3.     Assign an IPv4 log host to the flow log host group.

userlog host-group [ vpn-instance vpn-instance-name ] host flow { hostname | ipv4-address }

By default, an IPv4 flow log host group does not contain any log hosts.

Configuring an IPv6 flow log host group

1.     Enter system view.

system-view

2.     Create an IPv6 flow log host group and enter its view.

userlog host-group ipv6 host-group-name acl { name acl-name | number acl-number }

By default, no IPv6 flow log host groups exist.

3.     Assign an IPv6 log host to the flow log host group.

userlog host-group [ vpn-instance vpn-instance-name ] host flow ipv6 { hostname | ipv6-address }

By default, an IPv6 flow log host group does not contain any log hosts.

Display and maintenance commands for flow log

Execute display commands in any view and reset commands in user view.

 

Task

Command

Display flow log configuration and statistics.

display userlog export

Display flow log host group information.

display userlog host-group [ ipv6 ] [ host-group-name ]

Clear flow log statistics.

reset userlog flow export

NAT flow log configuration examples

Example: Configuring NAT flow log export

Network configuration

As shown in Figure 2, configure NAT flow log on the device to send NAT flow log entries generated for the user to the log host.

Figure 2 Network diagram

Procedure

# Configure IP addresses, as shown in Figure 2. Make sure the device, user, and the log host can reach one another. (Details not shown.)

# Enable NAT logging.

<Device> system-view

[Device] nat log enable

# Enable NAT logging for session establishment events, session removal events, and active flows.

[Device] nat log flow-begin

[Device] nat log flow-end

[Device] nat log flow-active 10

# Set the NAT flow log version to 3.0.

[Device] userlog flow export version 3

# Specify the log host at 1.2.3.6 as the destination for NAT flow log export. Set the UDP port number to 2000.

[Device] userlog flow export host 1.2.3.6 port 2000

# Specify 2.2.2.2 as the source IP address for NAT flow log packets.

[Device] userlog flow export source-ip 2.2.2.2

[Device] quit

Verifying the configuration

# Display the NAT flow log configuration and statistics.

<Device> display userlog export

Flow:

  Export flow log as UDP Packet.

  Version: 3.0

  Source ipv4 address: 2.2.2.2

  Log load balance function: Disabled

  Local time stamp: Disabled

  Number of log hosts: 1

 

  Log host 1:

    Host/Port: 1.2.3.6/2000

    Total logs/UDP packets exported: 112/87

Example: Configuring NAT flow log export to a NAT flow log host group

Network configuration

As shown in Figure 3, configure a NAT flow log host group on the device to send NAT flow log entries generated for the user only to Log Host 1.

Figure 3 Network diagram

Procedure

# Configure IP addresses, as shown in Figure 3. Make sure the device, user, and the log host can reach one another. (Details not shown.)

# Enable NAT logging.

<Device> system-view

[Device] nat log enable

# Enable NAT logging for session establishment events, session removal events, and active flows.

[Device] nat log flow-begin

[Device] nat log flow-end

[Device] nat log flow-active 10

# Specify Log Host 1 and Log Host 2 for NAT flow log export.

[Device] userlog flow export host 1.1.1.2 port 2000

[Device] userlog flow export host 2.2.2.2 port 2000

# Specify 3.3.3.3 as the source IP address for NAT flow log packets.

[Device] userlog flow export source-ip 3.3.3.3

# Create ACL 2000 to match packets sent by the user.

[Device] acl basic 2000

[Device-acl-ipv4-basic-2000] rule 1 permit source 169.1.1.2 0.0.0.0

[Device-acl-ipv4-basic-2000] quit

# Create an IPv4 NAT flow log host group named test and specify ACL 2000 for it.

[Device] userlog host-group test acl number 2000

# Assign Log Host 1 to NAT flow log host group test.

[Device-userlog-host-group-test] userlog host-group host flow 1.1.1.2

[Device-userlog-host-group-test] quit

Verifying the configuration

# Display information about NAT flow log host group test.

[Device] display userlog host-group test

Userlog host-group test:

  ACL number: 2000

 

  Flow log host numbers: 1

 

    Log host 1:

      Host/port: 1.1.1.2/2000

# After the user comes online, display NAT flow log export statistics.

[Device] display userlog export

Flow:

  Export flow log as UDP Packet.

  Version: 1.0

  Source ipv4 address: 3.3.3.3

  Log load balance function: Disabled

  Local time stamp: Disabled

  Number of log hosts: 2

 

  Log host 1:

    Host/Port: 1.1.1.2/2000

    Total logs/UDP packets exported: 13/13

 

  Log host 2:

    Host/Port: 2.2.2.2/2000

    Total logs/UDP packets exported: 0/0

RIR flow log configuration examples

Example: Configuring RIR flow log export

Network configuration

As shown in Figure 4, configure NAT flow log on the device to send NAT flow log entries generated for the user to the log host.

Figure 4 Network diagram

Procedure

# Configure IP addresses, as shown in Figure 4. Make sure the device, user, and the log host can reach one another. (Details not shown.)

# Enable RIR logging.

<Device> system-view

[Device] rir

[Device-rir] log enable

[Device-rir] quit

# Export RIR flow log entries to the log host at 1.2.3.6 and UDP port 2000.

[Device] userlog flow export host 1.2.3.6 port 2000

Verifying the configuration

# Verify that when link selection events occur on the device, the log host can receive RIR flow log entries for the events.


Appendix

Appendix A Flow log fields

The fields described in this section are those in the original log data sent to the log host. The log format might differ from the actual log format displayed on the log host. The displayed log format depends on the log analysis tool.

Log header fields

Table 1 shows the log header fields, and the corresponding length and description.

Table 1 Fields in a log header

Field

Length (Bytes)

Description

Version

1

Version number of the log packet:

·     1—Version 1.0.

·     3—Version 3.0.

·     5—Version 5.0.

·     7—Version 7.0.

LogType

1

Log type:

·     4—NAT flow log.

·     5—NAT66 flow log.

·     7—AFT IPv6 to IPv4 log.

·     8—AFT IPv4 to IPv6 log.

·     11—LB NAT64 flow log.

·     12—LB NAT46 flow log.

·     13—LB NAT44 flow log.

·     14—LB NAT66 flow log.

·     15—RIR flow log.

Count

2

Number of flows recorded in the current packet. The value range is 1 to 100.

Second

4

Number of seconds from 1970-01-01 00:00:00 to the time when the packet was generated.

FlowSequence

4

Sequence number of the log packet, which equals to the count of log packets of all log types and versions.

Chassis

2

Number of chassis sent the log packet.

Slot

1

Number of slot sent the log packet.

Cpu

1

Number of CPU sent the log packet.

NAT flow log fields

NAT flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 2, Table 3, Table 4, and Table 5 show the fields available in the versions.

Table 2 NAT flow log 1.0 fields

Field

Length (Bytes)

Description

SrcIP

4

Source IP address before NAT.

DestIP

4

Destination IP address before NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 if the Operator field is 6.

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

Reserved

2

Reserved for future use.

Table 3 NAT flow log 3.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol number.

Operator

1

Reasons why a NAT flow log was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

TosIPv4

1

ToS field of the IPv4 packet.

SourceIP

4

Source IP address before NAT.

SrcNatIP

4

Source IP address after NAT.

DestIP

4

Destination IP address before NAT.

DestNatIP

4

Destination IP address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

1

ID of the source VPN instance.

OutVPNID

1

ID of the destination VPN instance.

vSystemID

2

vSystem ID.

AppID

4

Application protocol ID.

Reserved3

4

Reserved field.

Table 4 NAT flow log 5.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a flow log was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

TosIPv4

1

ToS field of the IPv4 packet.

SourceIP

4

Source IP address before NAT.

SrcNatIP

4

Source IP address after NAT.

DestIP

4

Destination IP address before NAT.

DestNatIP

4

Destination IP address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds.

EndTime

4

End time of the flow, in seconds.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

AppID

4

Application protocol ID.

UserName

56

Username.

vSystemID

2

vSystem ID.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field

Reserved3

4

Reserved field

Table 5 NAT flow log 7.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a flow log was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

TosIPv4

1

ToS field of the IPv4 packet.

SourceIP

4

Source IP address before NAT.

SrcNatIP

4

Source IP address after NAT.

DestIP

4

Destination IP address before NAT.

DestNatIP

4

Destination IP address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds.

EndTime

4

End time of the flow, in seconds.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

AppID

4

Application protocol ID.

UserName

56

Username.

vSystemID

2

vSystem ID.

Reserved1

2

Reserved field.

aucDeviceSN

128

Device SN.

 

NAT66 flow log fields

NAT66 flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 6, Table 7, Table 8, and Table 9 show the fields available in the versions.

Table 6 NAT66 flow log 1.0 fields

Field

Length (Bytes)

Description

SrcIP

16

Source IPv6 address before NAT.

DestIP

16

Destination IPv6 address before NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 if the Operator field is 6.

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

Reserved

2

Reserved for future use.

Table 7 NAT66 flow log 3.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol number.

Operator

1

Reasons why a NAT flow log was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

Traffic class

1

Traffic Class field of the IPv6 packet.

SourceIP

16

Source IPv6 address before NAT.

DestIP

16

Destination IPv6 address before NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

AppID

4

Application protocol ID.

Table 8 NAT66 flow log 5.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a flow log was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

Traffic class

1

Traffic Class field of the IPv6 packet.

SourceIP

16

Source IPv6 address before NAT.

DestIP

16

Destination IPv6 address before NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

AppID

4

Application protocol ID.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field

Reserved3

4

Reserved field

Table 9 NAT66 flow log 7.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a flow log was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

Traffic class

1

Traffic Class field of the IPv6 packet.

SourceIP

16

Source IPv6 address before NAT.

DestIP

16

Destination IPv6 address before NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

AppID

4

Application protocol ID.

UserName

56

Username.

aucDeviceSN

128

Device SN.

 

AFT IPv6 to IPv4 flow log fields

AFT IPv6 to IPv4 flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 10, Table 11, Table 12, and Table 13 show the fields available in the versions.

Table 10 AFT IPv6 to IPv4 flow log 1.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

Traffic class

1

Traffic Class field of the IPv6 packet.

SourceIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved

4

Reserved field.

Table 11 AFT IPv6 to IPv4 flow log 3.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

Traffic class

1

Traffic Class field of the IPv6 packet.

SourceIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved

4

Reserved field.

Table 12 AFT IPv6 to IPv4 flow log 5.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

Traffic class

1

Traffic Class field of the IPv6 packet.

SourceIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field.

Reserved3

4

Reserved field.

Table 13 AFT IPv6 to IPv4 flow log 7.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

Traffic class

1

Traffic Class field of the IPv6 packet.

SourceIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

aucDeviceSN

128

Device SN.

 

AFT IPv4 to IPv6 flow log fields

AFT IPv4 to IPv6 flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 14, Table 15, Table 16, and Table 17 show the fields available in the versions.

Table 14 AFT IPv4 to IPv6 flow log 1.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

TosIPv4

1

ToS field of the IPv4 packet.

SourceIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved

4

Reserved field.

Table 15 AFT IPv4 to IPv6 flow log 3.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

TosIPv4

1

ToS field of the IPv4 packet.

SourceIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved

4

Reserved field.

Table 16 AFT IPv4 to IPv6 flow log 5.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

TosIPv4

1

ToS field of the IPv4 packet.

SourceIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field.

Reserved3

4

Reserved field.

Table 17 AFT IPv4 to IPv6 flow log 7.0 fields

Field

Length (Bytes)

Description

Protocol

1

Protocol type carried by IP.

Operator

1

Reasons why a NAT flow log entry was generated:

·     0—Reserved.

·     1—Flow was ended normally.

·     2—Flow was aged out because of aging timer expiration.

·     3—Flow was aged out because of configuration change or manual deletion.

·     4—Flow was aged out because of insufficient resources.

·     5—Reserved.

·     6—Regular connectivity check record for the active flow.

·     7—Flow was deleted because a new flow was created when the flow table was full.

·     8—Flow was created.

·     FE—Other reasons.

·     10-FE-1—Reserved for future use.

IPVersion

1

IP packet version.

TosIPv4

1

ToS field of the IPv4 packet.

SourceIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

StartTime

4

Start time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

EndTime

4

End time of the flow, in seconds. The value is counted from 1970/1/1 0:0.

This field is 0 when the Operator field is 6.

InTotalPkg

4

Number of packets received for the session.

InTotalByte

4

Number of bytes received for the session.

OutTotalPkg

4

Number of packets sent for the session.

OutTotalByte

4

Number of bytes sent for the session.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

aucDeviceSN

128

Device SN.

 

LB NAT64 flow log fields

LB NAT64 flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 18, Table 19, Table 20, and Table 21 show the fields available in the versions.

Table 18 LB NAT64 flow log 1.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 19 LB NAT64 flow log 3.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 20 LB NAT64 flow log 5.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field.

Reserved3

4

Reserved field.

Table 21 LB NAT64 flow log 7.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

aucDeviceSN

128

Device SN.

 

LB NAT46 flow log fields

LB NAT46 flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 22, Table 23, Table 24, and Table 25 show the fields available in the versions.

Table 22 LB NAT46 flow log 1.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 23 LB NAT46 flow log 3.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 24 LB NAT46 flow log 5.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field.

Reserved3

4

Reserved field.

Table 25 LB NAT46 flow log 7.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

aucDeviceSN

128

Device SN.

 

LB NAT44 flow log fields

LB NAT44 flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 26, Table 27, Table 28, and Table 29 show the fields available in the versions.

Table 26 LB NAT44 flow log 1.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 27 LB NAT44 flow log 3.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 28 LB NAT44 flow log 5.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field.

Reserved3

4

Reserved field.

Table 29 LB NAT44 flow log 7.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

4

Source IPv4 address before NAT.

SrcNatIP

4

Source IPv4 address after NAT.

DestIP

4

Destination IPv4 address before NAT.

DestNatIP

4

Destination IPv4 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field.

Reserved3

4

Reserved field.

aucDeviceSN

128

Device SN.

 

LB NAT66 flow log fields

LB NAT66 flow log has the following versions: 1.0, 3.0, 5.0, and 7.0. Table 30, Table 31, Table 32, and Table 33 show the fields available in the versions.

Table 30 LB NAT66 flow log 1.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 31 LB NAT66 flow log 3.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

Reserved2

4

Reserved field.

Table 32 LB NAT66 flow log 5.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

Reserved1

4

Reserved field.

Reserved2

4

Reserved field.

Reserved3

4

Reserved field.

Table 33 LB NAT66 flow log 7.0 fields

Field

Length (Bytes)

Description

LBVersion

1

Version number for the LB log.

Protocol

1

Protocol type carried by IP.

IPVersion

1

IP packet version.

Reserved1

1

Reserved field.

SrcIP

16

Source IPv6 address before NAT.

SrcNatIP

16

Source IPv6 address after NAT.

DestIP

16

Destination IPv6 address before NAT.

DestNatIP

16

Destination IPv6 address after NAT.

SrcPort

2

Source TCP/UDP port number before NAT.

SrcNatPort

2

Source TCP/UDP port number after NAT.

DestPort

2

Destination TCP/UDP port number before NAT.

DestNatPort

2

Destination TCP/UDP port number after NAT.

InVPNID

2

ID of the source VPN instance.

OutVPNID

2

ID of the destination VPN instance.

ContextID

4

ID of the context for the session.

UserName

56

Username.

aucDeviceSN

128

Device SN.

 

RIR flow log fields

NAT flow log entries of versions 1.0, 3.0, 5.0, and 7.0 are totally the same.

The following tables describe the fields in the flow log header and the fields in different types of RIR flow logs:

Table 34 Fields in the RIR flow log header

Field

Length (Bytes)

Description

Type

1

RIR flow log subtype:

·     0—Reserved.

·     1—Link selection.

·     2—Quality change.

·     3—Bandwidth change.

·     4—Configuration change.

·     5—Link fault.

·     6—Outbound interface bandwidth change.

·     7—Preemption change.

·     8—Exclusiveness change.

·     9—Bandwidth recalculation change.

·     10—RIR collaboration high priority flow scheduling.

Reserved

1

Reserved field.

Length

2

Data length of the subtype, excluding the log header.

Table 35 Fields in the link selection log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

SrcAddr

4

Source IP address.

DstAddr

4

Destination IP address.

SrcPort

2

Source port.

DstPort

2

Destination port.

Prot

1

Protocol number.

Reserved1

1

Reserved field.

Reserved2

2

Reserved field.

TunnelNum

4

Tunnel interface number selected in the current link selection event.

FlowID

4

Flow ID.

PreVrfNamePeer

32

VPN instance name in the previous link selection event.

PrePeerAddr

4

IP address of the peer in the previous link selection event.

PreTunnelNum

4

Tunnel interface number selected in the previous link selection event.

PreTimeStamp

4

Time system startup seconds in the previous link selection event.

Table 36 Fields in the quality change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

FlowID

4

Flow ID.

TunnelNum

4

Number of the tunnel interface where link quality changed.

CurDelay

4

Current latency.

CurJitter

4

Current jitter.

CurPktLoss

4

Current packet loss rate.

SlaDelay

4

SLA latency.

SlaJitter

4

SLA jitter.

SlaPktLoss

4

SLA packet loss rate.

PreVrfNamePeer

32

VPN instance name in the previous link selection event.

PrePeerAddr

4

IP address of the peer in the previous link selection event.

PreTunnelNum

4

Tunnel interface number selected in the previous link selection event.

PreTimeStamp

4

Time system startup seconds in the previous link selection event.

Table 37 Fields in the bandwidth change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

TunnelNum

4

Number of the tunnel interface whose bandwidth changed.

IndexOutIf

4

Number of the tunnel outgoing interface whose bandwidth changed.

IfSimpleName

25

Brief name of the outgoing interface.

Reserved1

1

Reserved field.

Reserved2

2

Reserved field.

BandTotal

8

Total bandwidth of the tunnel interface.

BandUsed

8

Used bandwidth of the tunnel interface.

Table 38 Fields in the link fault log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

TunnelNum

4

Number of the tunnel interface that had a fault.

Table 39 Fields in the out interface bandwidth change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

IndexOutIf

4

Number of the tunnel outgoing interface whose bandwidth changed.

IfSimpleName

25

Brief name of the outgoing interface.

Reserved1

1

Reserved field.

Reserved2

2

Reserved field.

BandTotal

8

Total bandwidth of the tunnel outgoing interface.

BandUsed

8

Used bandwidth of the tunnel outgoing interface.

Table 40 Fields in the primary/backup tunnel configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

1—Primary/backup tunnel configuration change.

TunnelNum

4

Number of the tunnel interface where primary/backup tunnel configuration changed.

Table 41 Fields in the tunnel RIR role configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

2—Client or server role change.

Flow ID

4

Flow ID.

TunnelNum

4

Number of the tunnel interface where client or server role changed.

Role

4

Role.

Table 42 Fields in the tunnel RIR collaboration link group configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

3—RIR collaboration link group configuration change.

TunnelNum

4

Number of the tunnel interface where RIR collaboration link group configuration changed.

GroupID

4

Number of the tunnel RIR collaboration link group.

Table 43 Fields in the tunnel exclusive flow configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

4—Tunnel exclusive flow configuration change.

TunnelNum

4

Number of the tunnel interface where exclusive flow configuration changed.

FlowID

4

Number of the flow template.

Table 44 Fields in the VSI interface link type and number configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

5—VSI interface link type and number configuration change.

LinkType

2

Link subtype:

·     0—Reserved.

·     1—4G.

·     2—Internet.

·     3—MPLS.

·     4—MSTP.

Index

2

Link number.

FlowID

4

Number of the flow template.

Table 45 Fields in the flow template deletion change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

6—Flow template deletion change.

FlowID

4

Number of the flow template.

Table 46 Fields in the flow template link type and number configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

7—Link type and link preference value configuration change.

FlowID

4

Number of the flow template.

LinkType

2

Link subtype:

·     0—Reserved.

·     1—4G.

·     2—Internet.

·     3—MPLS.

·     4—MSTP.

Index

2

Link number.

Preference

4

Link preference value.

Table 47 Fields in the flow template quality measurement configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

8—Quality measurement configuration change.

FlowID

4

Number of the flow template.

SlaID

4

SLA number.

NqaID

4

NQA number.

Table 48 Fields in the flow template expected bandwidth configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

9—Expected bandwidth configuration change.

FlowID

4

Number of the flow template.

BandWidth

8

Expected bandwidth.

Table 49 Fields in the link load balancing mode configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

10—Link load balancing mode configuration change.

FlowID

4

Number of the flow template.

Table 50 Fields in the flow template packet drop configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

11—Packet drop configuration change.

FlowID

4

Number of the flow template.

Table 51 Fields in the SLA link jitter threshold configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

12—SLA link jitter threshold configuration change.

TunnelID

4

Number of the tunnel interface where SLA link jitter threshold configuration changed.

FlowID

4

Number of the flow template.

SlaID

4

SLA number.

JitterThreshold

4

Link jitter threshold.

Table 52 Fields in the SLA link delay threshold configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

13—SLA link delay threshold configuration change.

TunnelID

4

Number of the tunnel interface where SLA link delay threshold configuration changed.

FlowID

4

Number of the flow template.

SlaID

4

SLA number.

DelayThreshold

4

Link delay threshold.

Table 53 Fields in the SLA link packet loss threshold configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

14—SLA link packet loss threshold configuration change.

TunnelID

4

Number of the tunnel interface where SLA link packet loss threshold configuration changed.

FlowID

4

Number of the flow template.

SlaID

4

SLA number.

LossThreshold

4

Link packet loss threshold.

Table 54 Fields in the NQA creation/deletion change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

15—NQA creation/deletion change.

FlowID

4

Number of the flow template.

NqaID

4

NQA number.

Table 55 Fields in the SLA creation/deletion change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

16—SLA creation/deletion change.

FlowID

4

Number of the flow template.

SlaID

4

SLA number.

Table 56 Fields in the RIR collaboration peer packet redirection address configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

17—RIR collaboration peer packet redirection address configuration change.

VrfNamePeer

32

VPN instance name of the peer.

RedirectVrfName

32

Redirection VPN instance name.

RedirectPeerAddr

4

IP address of the redirection device.

Table 57 Fields in the globally enabled RIR client or server configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

18—RIR client or server configuration change.

Role

4

Globally enabled RIR roles:

·     0—None.

·     1—Client.

·     2—Server.

FlowID

4

Number of the flow template.

TunnelID

4

Number of the tunnel interface where globally enabled RIR client or server configuration changed.

Table 58 Fields in the RIR quality detection information synchronization port number configuration change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

OptType

4

Option subtype:

·     1—Add.

·     2—Delete.

·     3—Modify.

SubType

4

19—RIR quality detection information synchronization port configuration change.

SyncPort

4

TCP port number.

FlowID

4

Number of the flow template.

TunnelID

4

Number of the tunnel interface where the configuration of RIR quality detection information synchronization port number changed.

Table 59 Fields in the bandwidth preemption change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

TunnelNum

4

Number of the tunnel interface where bandwidth preemption changed.

PreemptFlow

4

Flow with preemptive bandwidth.

ExcludedFlow

4

Flow with preempted bandwidth.

Table 60 Fields in the bandwidth exclusiveness change log

Field

Length (Bytes)

Description

VrfNamePeer

32

VPN instance name.

PeerAddr

4

IP address of the peer.

TunnelNum

4

Number of the tunnel interface where bandwidth exclusiveness changed.

DedicatedFlow

4

Flow with exclusive bandwidth.

ExcludedFlow

4

Flow whose bandwidth is occupied.

Table 61 Fields in the bandwidth recalculation change log

Field

Length (Bytes)

Description

SrcAddr

4

Source IP address.

DstAddr

4

Destination IP address.

SrcPort

2

Source port number.

DstPort

2

Destination port number.

Prot

1

Protocol number.

Reserved1

1

Reserved field.

Reserved2

2

Reserved field.

FlowID

4

Flow ID.

Table 62 Fields in the RIR collaboration high priority flow change log

Field

Length (Bytes)

Description

SrcAddr

4

Source IP address.

DstAddr

4

Destination IP address.

SrcPort

2

Source port number.

DstPort

2

Destination port number.

Prot

1

Protocol number.

Reserved1

1

Reserved field.

Reserved2

2

Reserved field.

FlowID

4

Flow ID.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网